Sciweavers

1548 search results - page 29 / 310
» Estimating Software Vulnerabilities
Sort
View
SAC
2009
ACM
15 years 4 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
QSIC
2006
IEEE
15 years 3 months ago
Software Project Level Estimation Model Framework based on Bayesian Belief Networks
Software estimation models should support managerial decision making in software projects. We experience that most of current models do not achieve this goal to the extend manager...
Hao Wang, Fei Peng, Chao Zhang, Andrej Pietschker
HOTSWUP
2009
ACM
15 years 2 months ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
ACSAC
2006
IEEE
15 years 3 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis